Version 1
: Received: 23 April 2021 / Approved: 26 April 2021 / Online: 26 April 2021 (13:24:46 CEST)
How to cite:
Atwal, E.S.; Kumar, D.U. A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints2021, 2021040673. https://doi.org/10.20944/preprints202104.0673.v1
Atwal, E.S.; Kumar, D.U. A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints 2021, 2021040673. https://doi.org/10.20944/preprints202104.0673.v1
Atwal, E.S.; Kumar, D.U. A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints2021, 2021040673. https://doi.org/10.20944/preprints202104.0673.v1
APA Style
Atwal, E.S., & Kumar, D.U. (2021). A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints. https://doi.org/10.20944/preprints202104.0673.v1
Chicago/Turabian Style
Atwal, E.S. and Dr. Umesh Kumar. 2021 "A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security" Preprints. https://doi.org/10.20944/preprints202104.0673.v1
Abstract
With the emerging technology connected with the internet, there is one constant issue related to that is data security. The only solution with which this issue can be resolved at a limit and can be used to protect the data is various algorithms for encryption. Though different approaches were used for the same, Cryptography seems to be efficiently protecting the data while transmitting in network from sender to receiver. Firstly the data is encrypted before sending to receiver using the most secure and reliable encryption algorithm. Secondly, at the receiver end it can be decrypted using the same decryption algorithm. Only receiver will have the key with which the data can be decrypted. In this paper, AES, DSS and RSA algorithms were implemented. These algorithms are encryption algorithms which perform encoding and decoding of data, to be sent from sender to receiver, using the keys. Each have different criteria for encryption and are then compared based on different parameters viz. delay, throughput, PDR is an acronym for packet delivery ratio, PLR represents packet loss ratio and RPC denotes Received Packet Count. The results in the form of graphs are given to analyze the security provided by each algorithm.
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.